Is it possible to whitelist specific device models in GFI EndPointSecurity?

Yes. You are able to whitelist device models within GFI EndPointSecurity. This is possible by performing the following steps:

Add the device model you wish to whitelist in the GFI EndPointSecurity device database

Add the device model from the device database to the policy.

Add the device model you wish to whitelist in the GFI EndPointSecurity device database

Attach the device model you want to whitelist to a computer. This computer must be accessible by the GFI EndPointSecurity server, since it must be scanned using the Device Scan utility in GFI EndPointSecurity

Logon to the GFI EndPointSecurity server with administrative credentials

Open the GFI EndPointSecurity Management Console

Click on the Tools tab and click on Device Scan

Enter the IP address or computer name of the computer you have attached the device to (in Step 1) under Scan target:

Ensure you have entered the appropriate administrative credentials to scan the remote machine under Scan Details > Credentials

Click on the Scan button

All the devices which are currently attached to the computer will be listed in the Device List. Right click the device you wish to whitelist using GFI EndPointSecurity and click Add to devices database.

Add the device model from the device database to the Whitelist for your policy

Within the GFI EndPointSecurity Management Console, click the Configuration tab

Click on the Protection Policy name you want to add the device to

In the right pane, click the Devices White List link.

In the White List dialog click the Add button

In the Select Devices dialog that opens, find the new device which you have just added to your Devices Database. Mark the checkbox near the device you wish to whitelist and click Next to continue.

Choose either All Serials if you want that model to be whitelisted or Only selected serials to choose specific serial numbers.

Click Finish to add the new policy to the protection policy

Note: Once the above configuration changes are done, you need to deploy the protection policy updates in order for the changes to start taking effect.